Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2719-1: poppler security update

    Date
    99
    Posted By
    Multiple vulnerabilities were discovered in the poppler PDF rendering library. CVE-2013-1788
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2719-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                           Michael Gilbert
    July 10, 2013                          https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : poppler
    Vulnerability  : several vulnerabilities
    Problem type   : local (remote)
    Debian-specific: no
    CVE ID         : CVE-2013-1788 CVE-2013-1790
    Debian Bug     : 702071
    
    Multiple vulnerabilities were discovered in the poppler PDF rendering
    library.
    
    CVE-2013-1788
    
        Multiple invalid memory access issues, which could potentially lead
        to arbitrary code execution if the user were tricked into opening a
        malformed PDF document.
    
    CVE-2013-1790
    
        An uninitialized memory issue, which could potentially lead to
        arbitrary code execution if the user were tricked into opening a
        malformed PDF document.
    
    For the oldstable distribution (squeeze), these problems have been fixed in
    version 0.12.4-1.2+squeeze3.
    
    For the stable (wheezy), testing (jessie), and unstable (sid)
    distributions, these problems have been fixed in version 0.18.4-6.
    
    We recommend that you upgrade your poppler packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"47","type":"x","order":"1","pct":83.93,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.07,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.